Folders and files Name Name Last commit message
Last commit date
parent directory
View all files
Challenge Name
Description
Hint
Intro PWN
We all have to start somewhere! Connect to the server at IP ADDR
There is something about connecting and a cat
exec
Executables depend on a lot of things, architecture, OS, language, libraries
Do it the easy way for less pain
simple_buffo1
A really simple buffer overflow
Without stack canaries, you can go pretty far!
Challenge Name
Description
Hint
revPop
Reverse a program to get the flag
Maybe doing some other static analysis would help
64archInts
Reverse this program and crack it to get the flag
Continue until you find the correct path
simple_buffo2
Numerous things have to be precisely correct to get this moving along
user input and cmd argument are called in different ways
Challenge Name
Description
sim-worker
What still befuddles me is, that there are so many TYPES of Vulnerabilities
You can’t perform that action at this time.